SlideShare a Scribd company logo
class disscussion
note: please use the attached textbook and other source for the
questions below;
1.Discuss pros and cons of identity and access management
architecture.
2.Do you think FedRAMP is an entry or an exit ramp for cloud
security? Please justify your opinion with your own rationale.
3.Discuss the relationship between data storage and network
security.
4.Introduce at least two latest network security management
software in the market and explain about their features.
5.Why we need National Patient Identifier? Are there any
privacy issues we need to consider? How can we deal with it
using HIPAA?
6.Pick one Social Media service provider and introduce its
security and privacy control policies and explain its past
security breaches in history if any.

More Related Content

More from MargenePurnell14

Intro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docxIntro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docx
MargenePurnell14
 
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docxIntro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
MargenePurnell14
 
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docxINTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
MargenePurnell14
 
Interview Each team member should interview an educator about his.docx
Interview Each team member should interview an educator about his.docxInterview Each team member should interview an educator about his.docx
Interview Each team member should interview an educator about his.docx
MargenePurnell14
 
IntroductionRisk management is critical to protect organization.docx
IntroductionRisk management is critical to protect organization.docxIntroductionRisk management is critical to protect organization.docx
IntroductionRisk management is critical to protect organization.docx
MargenePurnell14
 
Interview two different individuals regarding their positions in soc.docx
Interview two different individuals regarding their positions in soc.docxInterview two different individuals regarding their positions in soc.docx
Interview two different individuals regarding their positions in soc.docx
MargenePurnell14
 
Internet ExerciseVisit the homepage of Microsoft at www.micros.docx
Internet ExerciseVisit the homepage of Microsoft at www.micros.docxInternet ExerciseVisit the homepage of Microsoft at www.micros.docx
Internet ExerciseVisit the homepage of Microsoft at www.micros.docx
MargenePurnell14
 
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docx
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docxInterpersonal Violence Against Women, The Role of Men by Martin Schw.docx
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docx
MargenePurnell14
 
Internet of Vehicles-ProjectIntroduction - what you plan t.docx
Internet of Vehicles-ProjectIntroduction - what you plan t.docxInternet of Vehicles-ProjectIntroduction - what you plan t.docx
Internet of Vehicles-ProjectIntroduction - what you plan t.docx
MargenePurnell14
 
Interview an ELL instructor from a Title I school about how assessme.docx
Interview an ELL instructor from a Title I school about how assessme.docxInterview an ELL instructor from a Title I school about how assessme.docx
Interview an ELL instructor from a Title I school about how assessme.docx
MargenePurnell14
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
MargenePurnell14
 
International Finance Please respond to the followingBased on.docx
International Finance Please respond to the followingBased on.docxInternational Finance Please respond to the followingBased on.docx
International Finance Please respond to the followingBased on.docx
MargenePurnell14
 
International capital budgeting analysis and presentationBy the .docx
International capital budgeting analysis and presentationBy the .docxInternational capital budgeting analysis and presentationBy the .docx
International capital budgeting analysis and presentationBy the .docx
MargenePurnell14
 
Internet of Things       Word limit1500 - 2000Ma.docx
Internet of Things       Word limit1500 - 2000Ma.docxInternet of Things       Word limit1500 - 2000Ma.docx
Internet of Things       Word limit1500 - 2000Ma.docx
MargenePurnell14
 
INTERNATIONAL HUMAN RESOURCE - CASE DISCUSSION QUESTIONS1.Wh.docx
INTERNATIONAL HUMAN RESOURCE - CASE DISCUSSION QUESTIONS1.Wh.docxINTERNATIONAL HUMAN RESOURCE - CASE DISCUSSION QUESTIONS1.Wh.docx
INTERNATIONAL HUMAN RESOURCE - CASE DISCUSSION QUESTIONS1.Wh.docx
MargenePurnell14
 
International and Intercultural Communication After reviewing sect.docx
International and Intercultural Communication After reviewing sect.docxInternational and Intercultural Communication After reviewing sect.docx
International and Intercultural Communication After reviewing sect.docx
MargenePurnell14
 
International and Intercultural CommunicationAfter reviewing secti.docx
International and Intercultural CommunicationAfter reviewing secti.docxInternational and Intercultural CommunicationAfter reviewing secti.docx
International and Intercultural CommunicationAfter reviewing secti.docx
MargenePurnell14
 
Class Introduction to Scientific Computing LIVE inclass exam 
Class Introduction to Scientific Computing LIVE inclass exam Class Introduction to Scientific Computing LIVE inclass exam 
Class Introduction to Scientific Computing LIVE inclass exam 
MargenePurnell14
 
ClarifyQuality of the core concepts using notes  to help Use
ClarifyQuality of the core concepts using notes  to help Use ClarifyQuality of the core concepts using notes  to help Use
ClarifyQuality of the core concepts using notes  to help Use
MargenePurnell14
 
CLASS DISCUSSIONS.  Post a detailed response of 250 word
CLASS DISCUSSIONS.  Post a detailed response of 250 wordCLASS DISCUSSIONS.  Post a detailed response of 250 word
CLASS DISCUSSIONS.  Post a detailed response of 250 word
MargenePurnell14
 

More from MargenePurnell14 (20)

Intro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docxIntro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docx
 
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docxIntro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
 
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docxINTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
 
Interview Each team member should interview an educator about his.docx
Interview Each team member should interview an educator about his.docxInterview Each team member should interview an educator about his.docx
Interview Each team member should interview an educator about his.docx
 
IntroductionRisk management is critical to protect organization.docx
IntroductionRisk management is critical to protect organization.docxIntroductionRisk management is critical to protect organization.docx
IntroductionRisk management is critical to protect organization.docx
 
Interview two different individuals regarding their positions in soc.docx
Interview two different individuals regarding their positions in soc.docxInterview two different individuals regarding their positions in soc.docx
Interview two different individuals regarding their positions in soc.docx
 
Internet ExerciseVisit the homepage of Microsoft at www.micros.docx
Internet ExerciseVisit the homepage of Microsoft at www.micros.docxInternet ExerciseVisit the homepage of Microsoft at www.micros.docx
Internet ExerciseVisit the homepage of Microsoft at www.micros.docx
 
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docx
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docxInterpersonal Violence Against Women, The Role of Men by Martin Schw.docx
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docx
 
Internet of Vehicles-ProjectIntroduction - what you plan t.docx
Internet of Vehicles-ProjectIntroduction - what you plan t.docxInternet of Vehicles-ProjectIntroduction - what you plan t.docx
Internet of Vehicles-ProjectIntroduction - what you plan t.docx
 
Interview an ELL instructor from a Title I school about how assessme.docx
Interview an ELL instructor from a Title I school about how assessme.docxInterview an ELL instructor from a Title I school about how assessme.docx
Interview an ELL instructor from a Title I school about how assessme.docx
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
 
International Finance Please respond to the followingBased on.docx
International Finance Please respond to the followingBased on.docxInternational Finance Please respond to the followingBased on.docx
International Finance Please respond to the followingBased on.docx
 
International capital budgeting analysis and presentationBy the .docx
International capital budgeting analysis and presentationBy the .docxInternational capital budgeting analysis and presentationBy the .docx
International capital budgeting analysis and presentationBy the .docx
 
Internet of Things       Word limit1500 - 2000Ma.docx
Internet of Things       Word limit1500 - 2000Ma.docxInternet of Things       Word limit1500 - 2000Ma.docx
Internet of Things       Word limit1500 - 2000Ma.docx
 
INTERNATIONAL HUMAN RESOURCE - CASE DISCUSSION QUESTIONS1.Wh.docx
INTERNATIONAL HUMAN RESOURCE - CASE DISCUSSION QUESTIONS1.Wh.docxINTERNATIONAL HUMAN RESOURCE - CASE DISCUSSION QUESTIONS1.Wh.docx
INTERNATIONAL HUMAN RESOURCE - CASE DISCUSSION QUESTIONS1.Wh.docx
 
International and Intercultural Communication After reviewing sect.docx
International and Intercultural Communication After reviewing sect.docxInternational and Intercultural Communication After reviewing sect.docx
International and Intercultural Communication After reviewing sect.docx
 
International and Intercultural CommunicationAfter reviewing secti.docx
International and Intercultural CommunicationAfter reviewing secti.docxInternational and Intercultural CommunicationAfter reviewing secti.docx
International and Intercultural CommunicationAfter reviewing secti.docx
 
Class Introduction to Scientific Computing LIVE inclass exam 
Class Introduction to Scientific Computing LIVE inclass exam Class Introduction to Scientific Computing LIVE inclass exam 
Class Introduction to Scientific Computing LIVE inclass exam 
 
ClarifyQuality of the core concepts using notes  to help Use
ClarifyQuality of the core concepts using notes  to help Use ClarifyQuality of the core concepts using notes  to help Use
ClarifyQuality of the core concepts using notes  to help Use
 
CLASS DISCUSSIONS.  Post a detailed response of 250 word
CLASS DISCUSSIONS.  Post a detailed response of 250 wordCLASS DISCUSSIONS.  Post a detailed response of 250 word
CLASS DISCUSSIONS.  Post a detailed response of 250 word
 

class disscussionnote please use the attached textbook an

  • 1. class disscussion note: please use the attached textbook and other source for the questions below; 1.Discuss pros and cons of identity and access management architecture. 2.Do you think FedRAMP is an entry or an exit ramp for cloud security? Please justify your opinion with your own rationale. 3.Discuss the relationship between data storage and network security. 4.Introduce at least two latest network security management software in the market and explain about their features. 5.Why we need National Patient Identifier? Are there any privacy issues we need to consider? How can we deal with it using HIPAA? 6.Pick one Social Media service provider and introduce its security and privacy control policies and explain its past security breaches in history if any.